April 07, 2015
New infographic details the top healthcare spending trends from TechTarget's health IT purchasing survey, with security investments a likely priority.
August 19, 2014
The Community Health data breach exposed the personal data of 4.5 million patients of the healthcare entity, opening up potential regulatory issues.
May 08, 2014
Two New York hospitals agreed to pay a $4.8 million settlement for a potential HIPAA violation dating back to 2010.
September 23, 2013
All covered entities must comply with the HIPAA Omnibus Rule by September 23, but one expert questions whether business associates care enough.
HIPAA Get Started
Bring yourself up to speed with our introductory content
The technology behind secure desktop virtualization is a good fit for healthcare on a pair of important levels: Physicians get more time, and IT gets more control. Continue Reading
Experts say that while lip service for secure communications technology is great, the first step is convincing leaders and clinicians to recognize the risks to health data. Continue Reading
Many fear cloud computing in healthcare. But a long-term care company disputes that stance, instead going 100% into the cloud while firmly believing it complies with HIPAA. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate HIPAA Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Biometric security systems come with many advantages, but do they also come with many regulations? Expert Mike Chapple discusses biometric authentication compliance. Continue Reading
The rights of medical identity theft victims have been confused by health providers, but the rules under HIPAA are actually quite clear. Expert Mike Chapple explains. Continue Reading
To secure patient data in a world on the go, learn from breaches others have experienced, experts say, and look at how analytics can boost your security strategy. Continue Reading
Learn to apply best practices and optimize your operations.
As smartphones and tablets proliferate in hospitals -- increasing the risks of an endpoint security breach -- health IT executives must broaden and harden their defenses. Continue Reading
As healthcare providers and vendors seek information about how to safeguard personal health information (PHI), texting is one area that without question carries a great deal of risk. It's convenient, but unsecured texting of PHI opens healthcare ... Continue Reading
HIPAA data breach reporting now uses an electronic Web portal, so what does this mean for covered entities? Expert Mike Chapple explains. Continue Reading
Problem Solve HIPAA Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
HHS recommends security risk analysis as an early step to become HIPAA compliant, so how should organizations put this tip into practice? Continue Reading
The Community Health Systems breach in 2014 provided a learning opportunity for organizations handling PHI. Expert Mike Chapple reviews the key takeaways from the breach. Continue Reading
Mobile fitness apps can contain personal data, so should they be HIPAA-compliant? Expert Mike Chapple explains why that's not the right approach. Continue Reading